2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2020-11038" ,
"sourceIdentifier" : "security-advisories@github.com" ,
"published" : "2020-05-29T19:15:10.310" ,
2023-10-29 09:06:41 +00:00
"lastModified" : "2023-10-24T15:31:29.087" ,
"vulnStatus" : "Analyzed" ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "In FreeRDP less than or equal to 2.0.0, an Integer Overflow to Buffer Overflow exists. When using /video redirection, a manipulated server can instruct the client to allocate a buffer with a smaller size than requested due to an integer overflow in size calculation. With later messages, the server can manipulate the client to write data out of bound to the previously allocated buffer. This has been patched in 2.1.0."
} ,
{
"lang" : "es" ,
"value" : "En FreeRDP versiones anteriores o iguales a 2.0.0, se presenta un Desbordamiento de Enteros en un Desbordamiento de B\u00fafer. Cuando se usa una redirecci\u00f3n de /video, un servidor manipulado puede instruir al cliente para que asigne un b\u00fafer con un tama\u00f1o menor que el solicitado debido a un desbordamiento de enteros en el c\u00e1lculo del tama\u00f1o. Con mensajes posteriores, el servidor puede manipular al cliente para que escriba datos fuera del l\u00edmite en el buffer previamente asignado. Esto ha sido parcheado en la versi\u00f3n 2.1.0."
}
] ,
"metrics" : {
"cvssMetricV31" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:N/I:L/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "LOW" ,
"privilegesRequired" : "LOW" ,
"userInteraction" : "NONE" ,
"scope" : "UNCHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "LOW" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 5.4 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 2.8 ,
"impactScore" : 2.5
} ,
{
"source" : "security-advisories@github.com" ,
"type" : "Secondary" ,
"cvssData" : {
"version" : "3.1" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:N/UI:R/S:C/C:N/I:H/A:L" ,
"attackVector" : "NETWORK" ,
"attackComplexity" : "HIGH" ,
"privilegesRequired" : "NONE" ,
"userInteraction" : "REQUIRED" ,
"scope" : "CHANGED" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "HIGH" ,
"availabilityImpact" : "LOW" ,
"baseScore" : 6.9 ,
"baseSeverity" : "MEDIUM"
} ,
"exploitabilityScore" : 1.6 ,
"impactScore" : 4.7
}
] ,
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:S/C:N/I:P/A:P" ,
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "SINGLE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "PARTIAL" ,
"availabilityImpact" : "PARTIAL" ,
"baseScore" : 5.5
} ,
"baseSeverity" : "MEDIUM" ,
"exploitabilityScore" : 8.0 ,
"impactScore" : 4.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
2023-10-07 22:00:28 +00:00
"source" : "security-advisories@github.com" ,
2023-04-24 12:24:31 +02:00
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2023-10-07 22:00:28 +00:00
"value" : "CWE-680"
2023-04-24 12:24:31 +02:00
}
]
} ,
{
2023-10-07 22:00:28 +00:00
"source" : "nvd@nist.gov" ,
2023-04-24 12:24:31 +02:00
"type" : "Secondary" ,
"description" : [
{
"lang" : "en" ,
2023-10-07 22:00:28 +00:00
"value" : "CWE-190"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:freerdp:freerdp:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "2.1.0" ,
"matchCriteriaId" : "5C5F8D57-1D22-42B4-9E08-9131F7BE8FA5"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "B620311B-34A3-48A6-82DF-6F078D7A4493"
}
]
}
]
2023-10-29 09:06:41 +00:00
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "07B237A9-69A3-4A9C-9DA0-4E06BD37AE73"
}
]
}
]
2023-04-24 12:24:31 +02:00
}
] ,
"references" : [
{
"url" : "http://lists.opensuse.org/opensuse-security-announce/2020-07/msg00080.html" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
} ,
{
"url" : "https://github.com/FreeRDP/FreeRDP/security/advisories/GHSA-h25x-cqr6-fp6g" ,
"source" : "security-advisories@github.com" ,
"tags" : [
"Third Party Advisory"
]
2023-10-07 22:00:28 +00:00
} ,
{
"url" : "https://lists.debian.org/debian-lts-announce/2023/10/msg00008.html" ,
2023-10-29 09:06:41 +00:00
"source" : "security-advisories@github.com" ,
"tags" : [
"Mailing List" ,
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
}
]
}